560 likes | 689 Views
Stealing Passwords Remotely & Malware Analysis. PacITPros May 8, 2012. Bio. Summary. HTTP & HTTPS Passwords in RAM Windows Logon Passwords in RAM Java Attacks Evading Antivirus Malware Analysis Overview. HTTP & HTTPS Passwords in RAM. HTTP Authentication: Wikipedia. HTTP Web Login.
E N D
Stealing Passwords Remotely&Malware Analysis PacITPros May 8, 2012
Summary • HTTP & HTTPS Passwords in RAM • Windows Logon Passwords in RAM • Java Attacks • Evading Antivirus • Malware Analysis Overview
HTTP Authentication: Wikipedia HTTP Web Login
Password is transmitted over the Internet in plaintext Wireshark capture on next slide Capture login Statistics, Conversations TCP tab Follow Stream (with 13 packets) HTTP Web Login
Not Found • Windows doesn’t store login passwords in cleartext in RAM
Windows Credential Editor Written by Hernan Ochoa, 2011
Passwords are Encrypted • But the Keys are in RAM
This Attack is Not Counted in Those Graphs • The attack I am demonstrating does not rely on any of those vulnerabilities • This is Java operating as intended • Works on fully updated Java • No patch can be expected
Social-Engineer Toolkit • In BackTrack Linux
Countermeasures • Disable Java • Don’t use Adobe products • Antivirus helps some • Antivirus + Deep Freeze helps a LOT • BUT DON’T TRUST ANY COUNTERMEASURE • They are all easily bypassed
Techniques • Basic Static Analysis: File, Strings, and AV • Basic Dynamic Analysis: RegShot, Wireshark, Process Monitor, LordPE • Advanced Static Analysis: IDA Pro • Advanced Dynamic Analysis: Debuggers (not included in this talk)
Basic Dynamic Analysis Run Malware in a Virtual Machine
Packed Executables • .exe file lacks readable strings • When executed, the file unpacks itself into RAM and runs there • Solution: Analyze the RAM, not the hard disk file
Advanced Static Analysis IDA Pro